Play interactive tourEdit tour

Analysis Report https://www.amazon.com/gp/r.html?C=1GDZONJ9HF37K&K=399Q4AHHVBY11&M=urn:rtn:msg:20210330215523d28858d787154c4c839f5e9aa440p0na&R=KGA0LLH6J2LL&T=O&U=https%3A%2F%2Fimages-na.ssl-images-amazon.com%2Fimages%2FG%2F01%2Fnav%2Ftransp.gif&H=7UDAFTHMSIEXWWWXMQJ8NUL0Z9KA&ref_=pe_386300_440135490_opens

Overview

General Information

Sample URL:https://www.amazon.com/gp/r.html?C=1GDZONJ9HF37K&K=399Q4AHHVBY11&M=urn:rtn:msg:20210330215523d28858d787154c4c839f5e9aa440p0na&R=KGA0LLH6J2LL&T=O&U=https%3A%2F%2Fimages-na.ssl-images-amazon.com%2Fimages%2FG%2F01%2Fnav%2Ftransp.gif&H=7UDAFTHMSIEXWWWXMQJ8NUL0Z9KA&ref_=pe_386300_440135490_opens
Analysis ID:380839
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • iexplore.exe (PID: 484 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 1716 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:484 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: unknownHTTPS traffic detected: 99.86.164.215:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.164.215:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.157.3:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.157.3:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x3f694333,0x01d7280b</date><accdate>0x3f694333,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x3f694333,0x01d7280b</date><accdate>0x3f694333,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x3f706a59,0x01d7280b</date><accdate>0x3f706a59,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x3f706a59,0x01d7280b</date><accdate>0x3f706a59,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: www.amazon.com
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: ~DFAF282A198F71CD88.TMP.1.drString found in binary or memory: https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.gif
Source: {6978B809-93FE-11EB-90E5-ECF4BB570DC9}.dat.1.drString found in binary or memory: https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.gifRoot
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 99.86.164.215:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.164.215:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.157.3:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 99.86.157.3:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: classification engineClassification label: clean0.win@3/16@3/2
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6978B807-93FE-11EB-90E5-ECF4BB570DC9}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF4FE0FD20E7F8AA5F.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:484 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:484 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 380839 URL: https://www.amazon.com/gp/r... Startdate: 02/04/2021 Architecture: WINDOWS Score: 0 11 favicon.ico 2->11 6 iexplore.exe 1 73 2->6         started        process3 process4 8 iexplore.exe 2 32 6->8         started        dnsIp5 13 c.media-amazon.com 99.86.157.3, 443, 49708, 49709 AMAZON-02US United States 8->13 15 d3ag4hukkh62yn.cloudfront.net 99.86.164.215, 443, 49706, 49707 AMAZON-02US United States 8->15 17 4 other IPs or domains 8->17

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
https://www.amazon.com/gp/r.html?C=1GDZONJ9HF37K&K=399Q4AHHVBY11&M=urn:rtn:msg:20210330215523d28858d787154c4c839f5e9aa440p0na&R=KGA0LLH6J2LL&T=O&U=https%3A%2F%2Fimages-na.ssl-images-amazon.com%2Fimages%2FG%2F01%2Fnav%2Ftransp.gif&H=7UDAFTHMSIEXWWWXMQJ8NUL0Z9KA&ref_=pe_386300_440135490_opens0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
c.media-amazon.com
99.86.157.3
truefalse
    high
    d3ag4hukkh62yn.cloudfront.net
    99.86.164.215
    truefalse
      high
      www.amazon.com
      unknown
      unknownfalse
        high
        favicon.ico
        unknown
        unknownfalse
          unknown
          images-na.ssl-images-amazon.com
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.giffalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.wikipedia.com/msapplication.xml6.1.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.amazon.com/msapplication.xml.1.drfalse
                high
                http://www.nytimes.com/msapplication.xml3.1.drfalse
                  high
                  http://www.live.com/msapplication.xml2.1.drfalse
                    high
                    http://www.reddit.com/msapplication.xml4.1.drfalse
                      high
                      http://www.twitter.com/msapplication.xml5.1.drfalse
                        high
                        http://www.youtube.com/msapplication.xml7.1.drfalse
                          high
                          https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.gifRoot{6978B809-93FE-11EB-90E5-ECF4BB570DC9}.dat.1.drfalse
                            high
                            https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.gif~DFAF282A198F71CD88.TMP.1.drfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              99.86.164.215
                              d3ag4hukkh62yn.cloudfront.netUnited States
                              16509AMAZON-02USfalse
                              99.86.157.3
                              c.media-amazon.comUnited States
                              16509AMAZON-02USfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:380839
                              Start date:02.04.2021
                              Start time:14:56:38
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 2m 50s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:browseurl.jbs
                              Sample URL:https://www.amazon.com/gp/r.html?C=1GDZONJ9HF37K&K=399Q4AHHVBY11&M=urn:rtn:msg:20210330215523d28858d787154c4c839f5e9aa440p0na&R=KGA0LLH6J2LL&T=O&U=https%3A%2F%2Fimages-na.ssl-images-amazon.com%2Fimages%2FG%2F01%2Fnav%2Ftransp.gif&H=7UDAFTHMSIEXWWWXMQJ8NUL0Z9KA&ref_=pe_386300_440135490_opens
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:18
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:CLEAN
                              Classification:clean0.win@3/16@3/2
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 40.88.32.150, 92.122.145.220, 104.42.151.234, 52.147.198.201, 88.221.62.148, 184.30.24.56, 152.199.19.161, 20.82.209.183, 92.122.213.247, 92.122.213.194
                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, go.microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, e1723.g.akamaiedge.net, skypedataprdcoleus16.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, cs9.wpc.v0cdn.net
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6978B807-93FE-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):30296
                              Entropy (8bit):1.8447776463195191
                              Encrypted:false
                              SSDEEP:96:rKZBZ42EWitwbfUzEzKMfrq9LxQUxxfVES6X:rKZBZ42EWitAfERMmEQfV8X
                              MD5:41C378E6466A08CE91E78BA635E7045B
                              SHA1:53966BD628772BAD90A86EF11E48366DBABCBCE3
                              SHA-256:13C7B6F3FC7CE6D9D98EA7BBE5EA9A57496B3527442E29F72DF481CC422E56E1
                              SHA-512:B95E4101687F704FA1057D8986B162E4CA77290CF21D3D7D7562A2B8F5979D39D7F676A61106ADEBF31700FC330E6C4F7773638B98AA1940CCDB6F12C51B11B2
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6978B809-93FE-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):24244
                              Entropy (8bit):1.6435363037527613
                              Encrypted:false
                              SSDEEP:48:Iw2/GcprcUGwpauG4pQGGrapbSSGQpBhAGHHpch1TGUp8hHGzYpmhFaGopT13FFi:rkZbQO6IBS6jhv2h3WhlMhUn3Zg
                              MD5:F2EBF07136FC5CFDF0675DB354590222
                              SHA1:A19F762FC73BB202FC4C01585DA449BF514E20F2
                              SHA-256:4662DAD7E19E113D729BDE3B3A28BDF296B3E22DA6A644534DCC81C6BD9FCF56
                              SHA-512:DCBA8859B185CC08F217C70B7C217FF358B86881544FAB7A9BB8F66FBA9AFF48FCDF114274940B12777F9C5705C68243CA82549701CC0415077CCFC798763A6F
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6978B80A-93FE-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):16984
                              Entropy (8bit):1.5624166336600933
                              Encrypted:false
                              SSDEEP:48:IwNShGcpr/JGwpashG4pQkGrapbSVGQpKLG7HpRucTGIpG:rMXZbQsz6yBSfAKTuIA
                              MD5:E82DAB72C764F375C6E1ED1CD68EC01F
                              SHA1:7790D7125F468FB220F6F10FF64B79E544596DF5
                              SHA-256:960059D85ADF3F75893F947CCEF2399BB44B5AD4861909E18304FADA48EC4FB2
                              SHA-512:5DB09F8B3C687EB8FB567CD3A4DC60367F88D7F1164526069BD5F3F6D4225DF1AF724994119279590A3E2688140235FAC64111C86874A03FC7F8BCB2D4ED6B40
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.090942761673365
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxOESC4CnWimI002EtM3MHdNMNxOESC4CnWimI00ONVbkEtMb:2d6NxOLC4CSZHKd6NxOLC4CSZ7Qb
                              MD5:68678DA49D90FD7124F6668A7B176482
                              SHA1:E6DD18A61E3E4C8EA7F5384088BC89AC750E1A53
                              SHA-256:121F9A219B6E8C01BDA18193B0804594F03767D4C5C99444F7D21A4007898450
                              SHA-512:9392AA0BFB490E4FD4A745F42E9455DCB8B3B84FC4E3F9869A7EC0983D548D79182B237DE509E7AAB1F33930013A19A979EE974CB215FE9C8CAEDB46B7E287F7
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.118841577488532
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxe2ku7nCnWimI002EtM3MHdNMNxe2ku0XCnWimI00ONkak6EtMb:2d6Nxrn7nCSZHKd6Nxrn0XCSZ72a7b
                              MD5:5C4A9D4A6732D938CF8AA13482A7674B
                              SHA1:EF0F697FF6EEFDEAB95F366BD80683E4FAF9A739
                              SHA-256:40F0CE3CF30110CFBA1E380CFF36D809224495A3C3D0B89B97FDC867F5109315
                              SHA-512:243E850FF083F600F9CCFEB354ED2C843659739083A7F622819B4D412091FC430943209860BFB138D2DF5C84D8B76A945F0EC4E9B4AB87B95E54253FB7BE5484
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x3f66e0e1,0x01d7280b</date><accdate>0x3f66e0e1,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x3f66e0e1,0x01d7280b</date><accdate>0x3f694333,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):663
                              Entropy (8bit):5.1110470809746635
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxvLSC4CnWimI002EtM3MHdNMNxvLSC4CnWimI00ONmZEtMb:2d6NxvGC4CSZHKd6NxvGC4CSZ7Ub
                              MD5:21D3A2CABF85DB93C16842F4B834E24E
                              SHA1:7362BB5C887E643B005CC787307D37D7729FA14C
                              SHA-256:B1A648694664C3FF5562086C71B2ECDB5E896A3F4F8324EAEE962F03E730B6C7
                              SHA-512:9BCDCE5F581EE54505EECB2E525AB08210B43EB0FFFF7C39B40B443BCB5AD28C5888B9D6A835475C6FF6379B5B0EAFC1B1437AB6F600F1FD89F0231D5EE311B3
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):648
                              Entropy (8bit):5.1091547180977015
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxiwRFCnWimI002EtM3MHdNMNxiwRFCnWimI00ONd5EtMb:2d6NxhRFCSZHKd6NxhRFCSZ7njb
                              MD5:65C18B3AD0827F55A3A8631F6BA8A7D3
                              SHA1:242075A3F80AB67DBE262145978EBA46DB0FBF46
                              SHA-256:DD6623BE239C1435EEA40495C16E4531504CB727BEFD1A064A94AAE2719565F2
                              SHA-512:4C17952C01E32C3B82399FF25FBAA6AD9693DDDEDD5C5F07FD80682F81132211118AE78A1EC3B0D888B0AB0B623CC475AD0D6B0CA9F63A6BD7B908D04368EBFF
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.137027484144193
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxhGweCnWimI002EtM3MHdNMNxhGweCnWimI00ON8K075EtMb:2d6NxQJCSZHKd6NxQJCSZ7uKajb
                              MD5:B77479DC1995E605C3E70281BC00F3B0
                              SHA1:D6D7EFB1F2535CAED8A16E0AEAAD90A33061808C
                              SHA-256:869450DDA9E822D66E94534A773F7F2906998728009751E9A2530D8E51DF7436
                              SHA-512:D88D879C00037692570916927E25B44DF82124A60FB14B756C8426992C821A3919A797F39D78837278FF6103EA30B7B1CA97412EB512ED277BDB4D857B955FE3
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x3f706a59,0x01d7280b</date><accdate>0x3f706a59,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x3f706a59,0x01d7280b</date><accdate>0x3f706a59,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.0946754331049515
                              Encrypted:false
                              SSDEEP:12:TMHdNMNx0nSC4CnWimI002EtM3MHdNMNx0nSC4CnWimI00ONxEtMb:2d6Nx0SC4CSZHKd6Nx0SC4CSZ7Vb
                              MD5:EC182A7CD0D94BB0AF8D9336BB6133FD
                              SHA1:0205ADC834445E0FA3F81667DFF6CEF1EED71AF4
                              SHA-256:639D25CAA481D95BBDB853184A0C4821D7125A9B80B9B4BFCF50ADB59ED6C1EE
                              SHA-512:CFDA13D266378C99E195012F6C9199E2980FC1C8351B98A4EE3C4FC5B5441AF0534495CD2A00C1002B6B3AE4B59714AE3C51A6F0F50C1F5A8F04A51B516848F3
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x3f6e07f4,0x01d7280b</date><accdate>0x3f6e07f4,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.133562418812473
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxxwRFCnWimI002EtM3MHdNMNxxwRFCnWimI00ON6Kq5EtMb:2d6NxyRFCSZHKd6NxyRFCSZ7ub
                              MD5:FEB670FC4FDB21BEE472511CC6406801
                              SHA1:C107B041445B4DBEBD78755F6FFC46C77DA549B4
                              SHA-256:C80BA161162CFD190BD629DFB553DEB9F05D81375DCBFAB7D69198F54A2EACE8
                              SHA-512:8EF510CACB63414CD2FD72A7B49884C7EA0BCBF4E304B6589A567E37080F2E75780F22D3A199619B40917DE6A2099B649EB5D34486FE2DD1DC97A235F09016AE
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):660
                              Entropy (8bit):5.138271892070954
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxcBkXCnWimI002EtM3MHdNMNxcBkXCnWimI00ONVEtMb:2d6NxIkXCSZHKd6NxIkXCSZ71b
                              MD5:941A141A87D4BA48F398944B925C126A
                              SHA1:956390122E6CEE79B985ED94A3FC41871FC55854
                              SHA-256:6DB3C3ABD79A059021AFF29EC56AF3D1262FEDEBDB3D393C8260CAB7FEB0CBD1
                              SHA-512:0CC50B82ACF12AFB999F960BCCF5819915DE1664316C657B0080532DF309B06CD5DCCEA2BEE04E460AE8175965C9E613F04C706AEDE4B580A7BF0D6E03AAD2AA
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x3f694333,0x01d7280b</date><accdate>0x3f694333,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x3f694333,0x01d7280b</date><accdate>0x3f694333,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.094432526109964
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxfnwRFCnWimI002EtM3MHdNMNxfnwRFCnWimI00ONe5EtMb:2d6NxoRFCSZHKd6NxoRFCSZ7Ejb
                              MD5:31F7EF116385D391DAD4F7C9A62EFB3C
                              SHA1:B3299BA7121F96FDEA29023BC86F190FFAFC4D88
                              SHA-256:399F6BFA677224CD7859C7FED84A767098F965F71D761A8F07678E137C518FC7
                              SHA-512:7AFBF48A2F40F8393808E3A5480423FAC041A71A1A0BEFB478F9D4B20FD271823779E1EE9B9D061D5D5861D68EE2C9473D838DB11B8AE9CA9EF8F9B1FE9E503D
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x3f6ba5a2,0x01d7280b</date><accdate>0x3f6ba5a2,0x01d7280b</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\transp[1].gif
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:GIF image data, version 89a, 1 x 1
                              Category:downloaded
                              Size (bytes):43
                              Entropy (8bit):3.0314906788435274
                              Encrypted:false
                              SSDEEP:3:CUnaaatwltxlHh/:f/
                              MD5:FB02F374B8F73825415DB1BCCD4BD76D
                              SHA1:B103AA629CACDD90B39538A7561DA7F8E49AD73F
                              SHA-256:CAA849B179BEFA2645A8E2C474D2E82A76777A3305315ECE911013E8EE9A916C
                              SHA-512:3BE8176915593E79BC280D08984A16C29C495BC53BE9B439276094B8DCD3764A3C72A046106A06B958E08E67451FE02743175C621A1FAA261FE7A9691CC77141
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://images-na.ssl-images-amazon.com/images/G/01/nav/transp.gif
                              Preview: GIF89a.............!.......,...........D..;
                              C:\Users\user\AppData\Local\Temp\~DF4FE0FD20E7F8AA5F.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13029
                              Entropy (8bit):0.4747929034780874
                              Encrypted:false
                              SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fR/T9l8fR/T9lTq/CnQUM2MQ6M6ff6M1M+Rt:c9lLh9lLh9lIn9lIn9lo79lo79lWbb
                              MD5:CB938A18802FCA1EA1F24EE71BD4A3D3
                              SHA1:A513C1D807A3734D20FC5B44562A20E0DC31A487
                              SHA-256:EC176C36B6CAD751D5E542B14DAE5FDA49E943ADA9B3FB0D2D1063E772D4D5A7
                              SHA-512:4DC34161A93194942A45B967C88D405AFA248CB2422CD053CA2D259CFCC4F79B8E09117D951CB9343C7E2986BC2083378FA8438F68DC230BB23E0806F07BDFEE
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DFAF282A198F71CD88.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):34437
                              Entropy (8bit):0.36322278214362896
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwhL9lwhUk9l2h99l2hM:kBqoxKAuvScS+hUhyh4hJhFIhFh13FFD
                              MD5:FAB16474FF1DFEA02348E6E49C3A9793
                              SHA1:92DCA7655DE3BBDB7F10A520EE8F879416D92D36
                              SHA-256:2FE79060BE9C26A6136953EF947BCF814E83B0023C540509DDD33BAFC4EF06D0
                              SHA-512:F682E7E5976C11458090E26B8C70854B9E4922DE80AD02FEB9F456DB528F8090F2C62F5DA7501E0EDCE92A2EAC4ABFF61943D977CFED23A4CFFE618FC63F8611
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DFE3608ED5A967EBAC.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):25441
                              Entropy (8bit):0.27918767598683664
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
                              MD5:AB889A32AB9ACD33E816C2422337C69A
                              SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
                              SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
                              SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              No static file info

                              Network Behavior

                              Download Network PCAP: filteredfull

                              Network Port Distribution

                              • Total Packets: 88
                              • 443 (HTTPS)
                              • 53 (DNS)
                              TimestampSource PortDest PortSource IPDest IP
                              Apr 2, 2021 14:57:28.944664001 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:28.944772005 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:28.986255884 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:28.986284018 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:28.986371040 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:28.986411095 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:28.991602898 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:28.991708040 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033128023 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033175945 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033401966 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033480883 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033519030 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033571959 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033572912 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033618927 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033623934 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033672094 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033701897 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033724070 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.033746004 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.033778906 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.035617113 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.035744905 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.036355019 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.036442995 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.068324089 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.068511963 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.073879004 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.074481010 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.074536085 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.110596895 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.110646963 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.111164093 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.111242056 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.111291885 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.111354113 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.111953020 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.112252951 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.112353086 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.112365961 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.112420082 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.112905979 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.116561890 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.116935968 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.117002010 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.117053986 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.117119074 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.117166042 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.117233992 CEST49706443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.153362989 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.154330015 CEST4434970699.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.565498114 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.565524101 CEST4434970799.86.164.215192.168.2.5
                              Apr 2, 2021 14:57:29.565642118 CEST49707443192.168.2.599.86.164.215
                              Apr 2, 2021 14:57:29.663647890 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.663742065 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.705439091 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.705616951 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.706242085 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.707015038 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.707521915 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.708097935 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.747994900 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.748193979 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.748260021 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.748317003 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.748320103 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.748368025 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.749206066 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.750561953 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.750669003 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.751601934 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.761233091 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.761312008 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.761405945 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.761437893 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.761509895 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.761518955 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.766535997 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.766546011 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.766634941 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.767072916 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.767190933 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.770653963 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.771323919 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.808316946 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.808799982 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.808908939 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.808950901 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.808995962 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.808995962 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.809062004 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.810606003 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.810801983 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.810858965 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.810887098 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.810914993 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.813913107 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.814568043 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.814613104 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.814675093 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.814681053 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.814755917 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.818305969 CEST49709443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:29.853271961 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:29.861731052 CEST4434970999.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:30.260680914 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:30.302568913 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:30.312345028 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:30.312407970 CEST4434970899.86.157.3192.168.2.5
                              Apr 2, 2021 14:57:30.312525988 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:30.312578917 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:30.348696947 CEST49708443192.168.2.599.86.157.3
                              Apr 2, 2021 14:57:30.390676022 CEST4434970899.86.157.3192.168.2.5
                              TimestampSource PortDest PortSource IPDest IP
                              Apr 2, 2021 14:57:20.227262974 CEST6530753192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:20.297708988 CEST53653078.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:20.944607019 CEST6434453192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:21.000051975 CEST53643448.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:21.740748882 CEST6206053192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:21.799968958 CEST53620608.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:22.529001951 CEST6180553192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:22.589724064 CEST53618058.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:23.290854931 CEST5479553192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:23.339529991 CEST53547958.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:24.603571892 CEST4955753192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:24.650824070 CEST53495578.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:25.433098078 CEST6173353192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:25.489464045 CEST53617338.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:26.329284906 CEST6544753192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:26.375428915 CEST53654478.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:27.735012054 CEST5244153192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:27.791215897 CEST53524418.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:28.877793074 CEST6217653192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:28.935740948 CEST53621768.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:29.599298000 CEST5959653192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:29.661498070 CEST53595968.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:32.007056952 CEST6529653192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:32.053088903 CEST53652968.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:32.781333923 CEST6318353192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:32.827573061 CEST53631838.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:33.652869940 CEST6015153192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:33.698754072 CEST53601518.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:34.527177095 CEST5696953192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:34.573132038 CEST53569698.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:45.258786917 CEST5516153192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:45.321182966 CEST53551618.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:48.505721092 CEST5475753192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:48.564443111 CEST53547578.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:57.793484926 CEST4999253192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:57.841209888 CEST53499928.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:58.524343967 CEST6007553192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:58.571913004 CEST53600758.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:58.795033932 CEST4999253192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:58.841087103 CEST53499928.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:59.529865026 CEST6007553192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:59.575714111 CEST53600758.8.8.8192.168.2.5
                              Apr 2, 2021 14:57:59.797005892 CEST4999253192.168.2.58.8.8.8
                              Apr 2, 2021 14:57:59.843349934 CEST53499928.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:00.544944048 CEST6007553192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:00.602895021 CEST53600758.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:00.664001942 CEST5501653192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:00.709980965 CEST53550168.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:01.810709000 CEST4999253192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:01.856734991 CEST53499928.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:02.560756922 CEST6007553192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:02.608159065 CEST53600758.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:05.827023029 CEST4999253192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:05.873115063 CEST53499928.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:06.576697111 CEST6007553192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:06.623087883 CEST53600758.8.8.8192.168.2.5
                              Apr 2, 2021 14:58:10.341048002 CEST6434553192.168.2.58.8.8.8
                              Apr 2, 2021 14:58:10.405073881 CEST53643458.8.8.8192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Apr 2, 2021 14:57:28.877793074 CEST192.168.2.58.8.8.80x48e1Standard query (0)www.amazon.comA (IP address)IN (0x0001)
                              Apr 2, 2021 14:57:29.599298000 CEST192.168.2.58.8.8.80x2a01Standard query (0)images-na.ssl-images-amazon.comA (IP address)IN (0x0001)
                              Apr 2, 2021 14:57:45.258786917 CEST192.168.2.58.8.8.80xb27fStandard query (0)favicon.icoA (IP address)IN (0x0001)
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Apr 2, 2021 14:57:28.935740948 CEST8.8.8.8192.168.2.50x48e1No error (0)www.amazon.comtp.47cf2c8c9-frontier.amazon.comCNAME (Canonical name)IN (0x0001)
                              Apr 2, 2021 14:57:28.935740948 CEST8.8.8.8192.168.2.50x48e1No error (0)tp.47cf2c8c9-frontier.amazon.comd3ag4hukkh62yn.cloudfront.netCNAME (Canonical name)IN (0x0001)
                              Apr 2, 2021 14:57:28.935740948 CEST8.8.8.8192.168.2.50x48e1No error (0)d3ag4hukkh62yn.cloudfront.net99.86.164.215A (IP address)IN (0x0001)
                              Apr 2, 2021 14:57:29.661498070 CEST8.8.8.8192.168.2.50x2a01No error (0)images-na.ssl-images-amazon.comm.media-amazon.comCNAME (Canonical name)IN (0x0001)
                              Apr 2, 2021 14:57:29.661498070 CEST8.8.8.8192.168.2.50x2a01No error (0)m.media-amazon.comc.media-amazon.comCNAME (Canonical name)IN (0x0001)
                              Apr 2, 2021 14:57:29.661498070 CEST8.8.8.8192.168.2.50x2a01No error (0)c.media-amazon.com99.86.157.3A (IP address)IN (0x0001)
                              Apr 2, 2021 14:57:45.321182966 CEST8.8.8.8192.168.2.50xb27fName error (3)favicon.icononenoneA (IP address)IN (0x0001)
                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Apr 2, 2021 14:57:29.035617113 CEST99.86.164.215443192.168.2.549706CN=www.amazon.com, O="Amazon.com, Inc.", L=Seattle, ST=Washington, C=US CN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Jul 13 02:00:00 CEST 2020 Thu Aug 01 14:00:00 CEST 2013 Mon Nov 06 01:00:00 CET 2017Sat Jul 10 14:00:00 CEST 2021 Tue Aug 01 14:00:00 CEST 2028 Sun Nov 06 00:59:59 CET 2022771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=DigiCert Global CA G2, O=DigiCert Inc, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Aug 01 14:00:00 CEST 2013Tue Aug 01 14:00:00 CEST 2028
                              CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Nov 06 01:00:00 CET 2017Sun Nov 06 00:59:59 CET 2022
                              Apr 2, 2021 14:57:29.036355019 CEST99.86.164.215443192.168.2.549707CN=www.amazon.com, O="Amazon.com, Inc.", L=Seattle, ST=Washington, C=US CN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Jul 13 02:00:00 CEST 2020 Thu Aug 01 14:00:00 CEST 2013 Mon Nov 06 01:00:00 CET 2017Sat Jul 10 14:00:00 CEST 2021 Tue Aug 01 14:00:00 CEST 2028 Sun Nov 06 00:59:59 CET 2022771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=DigiCert Global CA G2, O=DigiCert Inc, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Aug 01 14:00:00 CEST 2013Tue Aug 01 14:00:00 CEST 2028
                              CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Nov 06 01:00:00 CET 2017Sun Nov 06 00:59:59 CET 2022
                              Apr 2, 2021 14:57:29.750561953 CEST99.86.157.3443192.168.2.549708CN=Images-na.ssl-images-amazon.com CN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USTue Mar 23 01:00:00 CET 2021 Thu Aug 01 14:00:00 CEST 2013 Mon Nov 06 01:00:00 CET 2017Wed Mar 23 00:59:59 CET 2022 Tue Aug 01 14:00:00 CEST 2028 Sun Nov 06 00:59:59 CET 2022771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=DigiCert Global CA G2, O=DigiCert Inc, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Aug 01 14:00:00 CEST 2013Tue Aug 01 14:00:00 CEST 2028
                              CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Nov 06 01:00:00 CET 2017Sun Nov 06 00:59:59 CET 2022
                              Apr 2, 2021 14:57:29.766546011 CEST99.86.157.3443192.168.2.549709CN=Images-na.ssl-images-amazon.com CN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global CA G2, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USTue Mar 23 01:00:00 CET 2021 Thu Aug 01 14:00:00 CEST 2013 Mon Nov 06 01:00:00 CET 2017Wed Mar 23 00:59:59 CET 2022 Tue Aug 01 14:00:00 CEST 2028 Sun Nov 06 00:59:59 CET 2022771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=DigiCert Global CA G2, O=DigiCert Inc, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Aug 01 14:00:00 CEST 2013Tue Aug 01 14:00:00 CEST 2028
                              CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USMon Nov 06 01:00:00 CET 2017Sun Nov 06 00:59:59 CET 2022

                              Code Manipulations

                              Statistics

                              CPU Usage

                              02040s020406080100

                              Click to jump to process

                              Memory Usage

                              02040s0.002040MB

                              Click to jump to process

                              Behavior

                              Click to jump to process

                              System Behavior

                              Start time:14:57:27
                              Start date:02/04/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff7553c0000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Start time:14:57:27
                              Start date:02/04/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:484 CREDAT:17410 /prefetch:2
                              Imagebase:0xf00000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              Disassembly